On Oct 16, 2012, at 5:34 PM, Shane Kerr wrote:

> Even trickier is to protect against an internal conspiracy, but I don't think 
> anyone is really seriously worried about that threat.

You don't need an internal conspiracy when organizations are penetrated through 
and through with botnets which can capture, log, and steal just about anything.

I understand the performance angle.  At best, the HSM is security 
posture-neutral; but, like Randy, I suspect their are side-channel and OoB 
issues which may well make it security posture-negative.  We don't really 
*know*, because no one's published a thorough analysis.

-----------------------------------------------------------------------
Roland Dobbins <[email protected]> // <http://www.arbornetworks.com>

          Luck is the residue of opportunity and design.

                       -- John Milton

_______________________________________________
dns-operations mailing list
[email protected]
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs

Reply via email to